# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60ccae1d27c2deed2c276f6415a0681b026e1acbdc010628a5321599c0f9a75f
Pseudo Output
60eadf1f1e2f7e1e62896a59de992dbd4f8dbad947f622bc8493ca64b61d1e01
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9857edd51639592e72a2a5e189e5aad56ce95f464bd6082678a98f2f1f7b6974
Commitment
a06aef305bdf0959fb289d3b4a645b794673c97a3b50040e4b820745b217f06a
Range Proof
672 bytes (Bulletproof)
Memo
e23276dd02c426cb86e2e85560ef013755e4c17c7a429cf0703f27ef55ce17f0b48e6bb14ed9ecc1a49616730e7dd7ae50ff683f1f4c65ba25b52c795a9725cc1342cc683c4e789dd55d39120582ffc598ee872ab9ebe4dd9d197c95304a91afc87b93e3504676f9516c8349e79799ab21d47eef587d9c4a43ca28d5705dddb1 (encrypted)
Stealth Address
26a54e3e9aea81c2e47d6e714442e692a42c387c730fb2f6846cfd560bb6f861
Commitment
341eff55f1572547cfbab67a2bfd14bdf5bec2f48ed3159734b68b9b4a208450
Range Proof
672 bytes (Bulletproof)
Memo
b52c4dde161c00b69043391311682c962a958fbf5fdfedb62850d93971609f129d232fd7798164fe18a9983f8f3d9cdd02e6ec71fdd1dc9f5d25cf2432841537b973cf689d5dcb3291e16eb3623b89968e7e756360144e8c45d2908ba9ad3fd38bd45e1f7209f4d1377d760a799a8640eed77de123eeff486ac0512a8e59bb7e (encrypted)
Stealth Address
dc26daebc066c018a8db4bcf550ea21d8750e7b572df69f58ece16ed8898075e
Commitment
36616c86b488ebeb999a46e1eebfa3fb3e277ce4d74b0ce21bb806b9f1e4ce65
Range Proof
672 bytes (Bulletproof)
Memo
6963d3a4767d2e4939e369dc2b67fe46e75bf21572b4e16492602ed2dbd7bc439bc3952d8fa2de9fce48174f3b76a06449f2a895802b9e5a7c9d31e2f697743c8c8926e3a0b862bf2aaad8c578495153b30bafe79fbdd06dad3bd49c33ff5a2c98ac6b79f9199f18fac4b241dec42aa8add1a1c09dc2ffd3fa5510d74d63f8f6 (encrypted)